ROI (Return on Investment) From Cloud Computing

ROI (Return on Investment) from Cloud Computing

A business organization often measures the value of investments or any move that requires money in terms of the return on investment (ROI). Perhaps it is the only reason that top management will agree to any proposal, especially bold ones like adapting the relatively new and untested cloud computing paradigm. Businesses have a habit of only embracing what is proven and tested while disregarding the possibilities and rewards of embracing new systems and methods. Though, I have to admit that more and more organizations are becoming bolder and starting to embrace new technology, especially the relatively new and smaller ones who are just getting into the business. These are the ones that have less to lose because they have not invested in older systems which are considered as lost investment when abandoned, and they can start fresh with new systems not weighted down with the familiarity of old ones.

Though it is quite difficult to calculate ROI from using cloud computing, we can start by finding returns in the three major benefits area for adapting cloud computing: Productivity enhancement, cost reduction and revenue transformation.

  • Cost savings from using cloud services – after doing categorization on the organization’s applications, they can estimate potential savings by shifting to cloud services. One way is migrating ERP resources into a public/private cloud infrastructure. Through virtualization and consolidation, they can reduce the number of servers running in-house and reduce the number of racks used significantly. This can generate up to 70% ROI for a Tier 3 workload and about 50% for Tier 1.
  • Cost Savings from Labor and software – Huge savings can be had through the labor reduction brought by reducing hardware infrastructure. This includes savings from the development and maintenance of applications and hardware. There is also a highly reduced need for installed software as cloud-hosted software can be made available to any workstation with an internet connection, which significantly lowers the required budget for software.
  • Cost savings from hosting – the spending budget for hosting infrastructure is made evident quickly. Hosting in-premises means acquiring your own hardware which is considered as a capital expenditure and could be quite large. While availing of cloud hosting is considered as an operational expenditure because of its subscription or pay-per-use model.

But often, the ROI is not simply measured through the savings in terms of monetary value. The best measurement of the ROI of cloud computing is simply in its VALUE. ROI doesn’t always look very enticing especially when cloud computing is concerned. That is why administrators and CIOs should be looking at the apparent values that come in many forms when employing cloud computing. What they should be asking is “What do I expect to get if I use this service?” and similar value related questions, not monetary related ones. You can set up metrics to determine the apparent value that cloud computing services are able to provide.

Take for example the following:

  • The speed of adaptation and deployment of the cloud service versus the maintenance and upgrade costs and downtimes of the old system.
  • The general ease of use and dynamic usage afforded by the new system. How flexible will the new system be in terms of coping with the ever changing business needs and goals?
  • What are the risks involved with processing and storing data offsite and not having to worry about the back end of the systems?
  • The support and other value added services offered by the provider. Are there any at all?
  • What are the environmental impacts of sourcing our IT services from the cloud? Is there a positive outcome to more and more organizations having co-location of infrastructure?
  • What about the apparent savings and the hassle in paying utility bills?

It is true that ROI is important, but the monetary side should not be the only basis for ROI. The value add offered by cloud services should also be highly considered when contemplating the use of cloud computing, even if it is sometimes intangible.

By Abdul Salam

Sorry, comments are closed for this post.

Comics
Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises The surface costs might give you pause, but the cost of diminishing your differentiators is far greater. Will a shift to the cloud save you money? Potential savings are historically the main business driver cited when companies move to the cloud, but it shouldn’t be viewed as a cost-saving exercise. There…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Two 2017 Trends From A Galaxy Far, Far Away

Two 2017 Trends From A Galaxy Far, Far Away

Reaching For The Stars People who know me know that I’m a huge Star Wars fan. I recently had the opportunity to see Rogue One: A Star Wars Story. While I won’t give any spoilers away for the few who haven’t seen the movie yet, I do want to mention a couple of trends from…

The Key To Improving Business Lies In Eye-Interaction Tech

The Key To Improving Business Lies In Eye-Interaction Tech

Eye-Interaction Technology Analysts at Goldman Sachs predict virtual reality revenue will surpass TV within the next decade. More than just some gaming fad, VR represents a whole new way for organizations to train, research, and explore vast amounts of data. Despite its popularity, however, VR is still not in the hands of the majority, and…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…